Lidera Network signs agreement with Cylance

Cylance and Lidera Network to offer a revolutionary cybersecurity solution that protects endpoints against advanced persistent threats and malware with extremely high efficacy.

Read More
Hackers only need 24 hours

More than three-quarters (88%) of hackers can break through cybersecurity defences and into the systems they target within 12 hours, while 81% say they can identify and take valuable data within another 12 hours, even though the breach may not be discovered for hundreds of days, according to...

Read More
Ransomware threat doubles

Check Point’s H2 2016 Global Threat Intelligence Trends Report, highlights key trends in network and mobile malware.

Read More
NEWS
Predicting people - the future of security

Nearly 80 percent of cyber professionals say enterprises must understand behaviors and intent as people interact with critical data and IP; today, less than a third are able to do so effectively.

Read More
NEWS
2016: a year of ransomware in spam

According to Kaspersky Lab “Spam and phishing in 2016” report, about 20 per cent of all spam...

Read More
Cybersecurity certification first to address behavioural analytics

CompTIA Cybersecurity Analyst (CSA+) becomes first training tool incorporating in-depth...

Read More
NEWS
Growing security, and compliance challenges in face of increasing cloud services adoption

The average company runs 464 custom applications; and more than 70 percent of these are...

Read More
Only three percent of businesses equipped to meet security attacks

New study from Tripwire reveals that most organizations are seriously lacking in both skills...

Read More
Geopolitical changes drive data privacy concerns

Only 29% of respondents say they have high levels of confidence in their organizations’ ability...

Read More
European companies are 'too slack' in preventing cybercrime

Cybersecurity threat list for 2017 from Fujitsu Security Operations Center highlights critical...

Read More
Google security support

nShield HSM “bring your own key” now available for Google customers supplying keys.

Read More
Tenable expands partner Ecosystem

Tenable.io brings automated exchange of vulnerability data with CyberArk, ForeScout and other...

Read More
NEWS
IT departments find it hard to keep the Cloud safe

Trust now outnumbers distrust for public clouds by more than 2-to-1.

Read More
Trustwave introduces Proactive Threat Hunting Service

Trustwave has introduced enhanced managed security and professional services designed to help...

Read More
NEWS
Addressing Cloud security challenges

The Symantec Cloud Security Platform ensures information security and protects against threats...

Read More

Videos

Shahar Belkin, Chief Evangelist at ZutaCore, explains how the company’s OmniTherm™ cold plate enables waterless two-phase cooling for manufacturers building servers with the NVIDIA RTX PRO 6000 Blackwell...
Sean Burke, CEO at Enteligent, positions 800V DC to 50V DC as the ‘missing piece’ in AI data centre power design. While 800VDC distribution solves the upstream limitations of traditional AC infrastructure,...
Robert Tanner, Locker & Vending Solutions Specialist at LapSafe, discusses the AI Smart Locker, which recently won ‘AI & Automation Project of the Year’ at the MSP Channel Awards. He explains how the...
In this discussion, David Primor, CEO of Cynomi, and Dennis Boone, President of SlashBlue, explore why third-party risk management is rapidly becoming essential for MSPs and MSSPs. They share real-world...

Expert Opinions

By Richard Clifford, VP of sales & Solutions EMEA Salute.
First Australian Data Centre Forecast Report provides new insight and context on data centre development in Australia.
By Sergei Serdyuk, VP of Product Management, NAKIVO.
By Stewart Hunwick, Field CTO, Storage Platforms and Solutions, Dell Technologies.